• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 565
Next 10 →

The S/KEY One-Time Password System

by Neil Haller - In Proceedings of the Internet Society Symposium on Network and Distributed Systems , 1994
"... Computing systems have been under increasingly sophisticated attack over the Internet and by using dial-up access ports. One form of attack is eavesdropping on network connections to obtain login id's and passwords of legitimate users. This information is used at a later time to attack the syst ..."
Abstract - Cited by 255 (1 self) - Add to MetaCart
Computing systems have been under increasingly sophisticated attack over the Internet and by using dial-up access ports. One form of attack is eavesdropping on network connections to obtain login id's and passwords of legitimate users. This information is used at a later time to attack

Modem Pool Simulation And Performance Analysis

by David Novak Daniel, Daniel Rowl, Michael Stepanek, David Watkins, Luiz Dasilva
"... In the near future, dial-up connections will still be one of the most popular methods of remote access to the Internet as well as to enterprise networks. The dimensioning of modem pools to support this type of access is of particular importance to commercial Internet service providers (ISPs) as well ..."
Abstract - Add to MetaCart
In the near future, dial-up connections will still be one of the most popular methods of remote access to the Internet as well as to enterprise networks. The dimensioning of modem pools to support this type of access is of particular importance to commercial Internet service providers (ISPs

Exploiting Weak Connectivity for Mobile File Access

by Lily B. Mummert, Maria R. Ebling, M. Satyanarayanan , 1995
"... Weak connectivity, in the form of intermittent, low-bandwidth, or expensive networks is a fact of life in mobile computing. In this paper, we describe how the Coda File System has evolved to exploit such networks. The underlying theme of this evolution has been the systematic introduction of adaptiv ..."
Abstract - Cited by 197 (22 self) - Add to MetaCart
Weak connectivity, in the form of intermittent, low-bandwidth, or expensive networks is a fact of life in mobile computing. In this paper, we describe how the Coda File System has evolved to exploit such networks. The underlying theme of this evolution has been the systematic introduction

Honeycomb -- Creating Intrusion Detection Signatures Using Honeypots

by Christian Kreibich, Jon Crowcroft - IN PROCEEDINGS OF THE SECOND WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-II , 2004
"... This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and protocol conformance checks on multiple levels in the protocol hierarchy to network traffic captured a honeypot system. We present ..."
Abstract - Cited by 209 (2 self) - Add to MetaCart
results of running the system on an unprotected cable modem connection for 24 hours. The system successfully created precise traffic signatures that otherwise would have required the skills and time of a security officer to inspect the traffic manually.

Regulated Retail Tariff Structures, Dial-Up Substitution and Broadband Diffusion: Learning from New Zealand’s Experience

by Bronwyn Howell , 2008
"... do not necessarily represent those of the institutions with which she is affiliated or their constituent members. Any errors or omissions remain the responsibility of the author. Despite an apparent absence of supply side impediments to the uptake of broadband, New Zealand has persistently exhibited ..."
Abstract - Add to MetaCart
in substitution from legacy dial-up to frontier broadband internet access in New Zealand occurring at a higher user valuation of both internet connection and usage than if the telephony tariff was set at a level whereby the fixed component recovered fixed costs and the variable usage

Adaptive modem connection lifetimes

by Fred Douglis, Fred Douglis, Tom Killian, Tom Killian - In Proceedings of the 1999 USENIX Annual Technical Conference , 1999
"... Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more ..."
Abstract - Add to MetaCart
Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association:

Jin: \Workload Characterization of a Web Proxy in a Cable Modem Environment

by Martin Arlitt, Rich Friedrich, Tai Jin
"... workload characterization, performance, proxy caching This paper presents a detailed workload characterization study of a World-Wide Web proxy. Measurements from a proxy within an Internet Service Provider (ISP) environment were collected. This ISP allows clients to access the Web using highspeed ca ..."
Abstract - Cited by 74 (8 self) - Add to MetaCart
cable modems rather than traditional dial-up modems. By examining this site we are able to evaluate the effects that cable modems have on proxy workloads. This paper focuses on workload characteristics such as file type distribution, file size distribution, file referencing behaviour and turnover

Network Working Group Request for Comments: 2341 Category

by A. Valencia, M. Littlewood, T. Kolar, Cisco Systems , 1998
"... This memo describes a historic protocol for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1998). All Rights Reserved. Virtual dial-up allows many separate and autonomous proto ..."
Abstract - Add to MetaCart
protocol domains to share common access infrastructure including modems, Access Servers, and ISDN routers. Previous RFCs have specified protocols for supporting IP dial-up via SLIP [1] and multiprotocol dial-up via PPP [2]. This document describes the Layer Two Forwarding protocol (L2F) which permits

Load balancing in structured p2p systems

by Ananth Rao, Karthik Lakshminarayanan, Sonesh Surana, Richard Karp, Ion Stoica , 2003
"... Most P2P systems that provide a DHT abstraction distribute objects among “peer nodes ” by choosing random identifiers for the objects. This could result in an O(log N) imbalance. Besides, P2P systems can be highly heterogeneous, i.e. they may consist of peers that range from old desktops behind mode ..."
Abstract - Cited by 141 (0 self) - Add to MetaCart
modem lines to powerful servers connected to the Internet through high-bandwidth lines. In this paper, we address the problem of load balancing in such P2P systems. We explore the space of designing load-balancing algorithms that uses the notion of “virtual servers”. We present three schemes that differ

Performing Replacement in Modem Pools

by Yannis Smaragdakis, Paul Wilson , 2000
"... We examine a policy for managing modem pools that disconnects users only if not enough modems are available for other users to connect. Managing the modem pool then becomes a replacement problem, similar to buffer cache management (e.g., in virtual memory systems) . When a new connection request is ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
We examine a policy for managing modem pools that disconnects users only if not enough modems are available for other users to connect. Managing the modem pool then becomes a replacement problem, similar to buffer cache management (e.g., in virtual memory systems) . When a new connection request
Next 10 →
Results 11 - 20 of 565
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University